Proceedings of the 39th Symposium on Principles of Distributed Computing 2020
DOI: 10.1145/3382734.3405708
|View full text |Cite
|
Sign up to set email alerts
|

Brief Announcement: Not a COINcidence: Sub-Quadratic Asynchronous Byzantine Agreement WHP

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1
1

Relationship

2
5

Authors

Journals

citations
Cited by 13 publications
(21 citation statements)
references
References 14 publications
0
21
0
Order By: Relevance
“…In some cases, randomized BA requires deterministic validity and agreement while allowing termination with probability 1. Other works [16,21,24] solve BA with high probability, where all properties are assured with high probability.…”
Section: Models and Definitionsmentioning
confidence: 99%
See 2 more Smart Citations
“…In some cases, randomized BA requires deterministic validity and agreement while allowing termination with probability 1. Other works [16,21,24] solve BA with high probability, where all properties are assured with high probability.…”
Section: Models and Definitionsmentioning
confidence: 99%
“…A few recent studies have used randomness to circumvent Dolev and Reischuk's lower bound and provide BA solutions with sub-quadratic word complexity [2,6,16,21,24,26,32,33,37] in all three models. There are two approaches to using probability.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Static corruptions are done before the protocol begins but can be a function of the trusted setup; adaptive corruptions can occur during the course of the protocol. ( †) The protocols from [1,8,22,26] reach agreement from scratch (hence also from almost-everywhere agreement) with amortized˜(1) communication per party; the expected round complexity is constant and termination is guaranteed in polylog( ) rounds.…”
Section: Technical Overviewmentioning
confidence: 99%
“…Without this extra model assumption, their VRF approach does not apply. We note that several recent consensus protocols [1,8,18,19,25,26,58,59] also follow the sortition approach of [22]; however, similar to our first construction, their PKI is assumed to be honestly generated by a trusted third party. Theorem 2.7 (SRDS from OWF and trusted PKI, informal).…”
Section: Srds Constructionsmentioning
confidence: 99%